Page 635 - StudyBook.pdf
P. 635

Operational and Organizational Security: Incident Response • Chapter 11  619

                 Tailgating

                 Even with the most stringent physical security in place, there are ways of bypassing
                 these methods and gaining access. One of the simplest methods is tailgating, or pig-
                 gybacking, in which an unauthorized person follows an authorized person into a
                 secure area. Regardless of whether a person has to use a key, PIN number, card key,
                 biometrics, or other methods to open a door and enter, all a second person needs
                 to do is follow him or her through the door. Even if the first person notices the
                 security breach, they may feel uncomfortable challenging the person whose tail-
                 gating, and not bother asking the person to provide identification, get out, or go
                 back and use their own key or access to enter.
                    Intruders piggybacking on another person’s access can be a real security chal-
                 lenge, because any existing security measures are rendered useless even though
                 they’re functioning properly. It is especially common if the authorized person
                 knows the tailgater, such as when management, a coworker, or others who are visu-
                 ally recognized are piggybacking. It’s common to see one person use a key card to
                 enter a building and several others follow their way in. However, even in these
                 cases, you cannot be a hundred percent sure that one of them has been dismissed
                 from the company, under a disciplinary action (such as suspension), or is a con-
                 tractor whose contract has ended. Even if the person legitimately works for the
                 company, allowing them to piggyback their way into a server room could result in
                 equipment being knocked over, sensitive documents (such as administrator pass-
                 words) being seen, or other problems.
                    As we’ll see in the section on social engineering, human nature can cause sig-
                 nificant problems for any security measures you put in place, and there is no easy
                 way of dealing with it. Policies can be implemented that prohibit allowing anyone
                 to enter an area unless they have used their own security access method (i.e. key,
                 access card, PIN number, and so forth), with procedures on what to do if someone
                 does sneak in behind a person (such as challenging the person to produce ID, noti-
                 fying security personnel, and so forth). However, most employees are neither
                 trained nor willing to confront or physically remove a person from the premises, so
                 often the policy may be ignored for personal safety reasons or because it is emo-
                 tionally uncomfortable.After all, no one wants to ask their boss to get out of the
                 building or room because they snuck in the door.
                    This makes education one of the best methods of combating the problem.
                 Employees should be educated that tailgating is a security issue, that policies exist
                 that make a person responsible for those permitted access, and that allowing an
                 unauthorized person access could result in disciplinary actions (including termina-



                                                                              www.syngress.com
   630   631   632   633   634   635   636   637   638   639   640